CVE-2019-3821 (retired)

Priority
Description
A flaw was found in the way civetweb frontend was handling requests for
ceph RGW server with SSL enabled. An unauthenticated attacker could create
multiple connections to ceph RADOS gateway to exhaust file descriptors for
ceph-radosgw service resulting in a remote denial of service.
Assigned-to
mdeslaur
Package
Source: ceph (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 ESM (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (10.2.11-0ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (12.2.11-0ubuntu0.18.04.2)
Ubuntu 18.10 (Cosmic Cuttlefish):released (13.2.4+dfsg1-0ubuntu0.18.10.2)
Ubuntu 19.04 (Disco Dingo):released (13.2.4+dfsg1-0ubuntu2.1)
Ubuntu 19.10 (Eoan):released (14.2.1-0ubuntu1)
Patches:
Upstream:https://github.com/ceph/civetweb/commit/8fba7751f61a20158fedc3fc69684e9fe8cd0dce
More Information

Updated: 2019-06-27 16:15:12 UTC (commit 47455bc0fad06f0a3f4b0e67d271bc36b67e56e2)